Instruction/ maintenance manual of the product RJ-45-to-AUX Cisco
Go to page of 411
.
Table of Contents Cisco Switching Black Book ...............................................................................................................................1 Introduction ................................................................
Table of Contents Chapter 2: Basic Switch Configuration The RJ−45−to−AUX Port Console Connector Pinouts ...................................................................36 Switch IOSs ...........................................................
Table of Contents Chapter 3: WAN Switching BPX 8600 Series Wide−Area Switches ..........................................................................................58 MGX 8800 Series Wide−Area Edge Switches.....................................
Table of Contents Chapter 4: LAN Switch Architectures LCP ..................................................................................................................................................75 SAGE ASIC ..................................
Table of Contents Chapter 5: Virtual Local Area Networks .......................................................................................................88 In Depth ...............................................................................
Table of Contents Chapter 6: InterVLAN and Basic Module Configuration ..........................................................................114 In Depth ..............................................................................................
Table of Contents Chapter 7: IP Multicast Time to Live ..................................................................................................................................147 Multicast at Layer 2 .........................................
Table of Contents Chapter 7: IP Multicast Configuring Packet−Based Suppression ..............................................................................................159 Disabling Multicast Suppression ........................................
Table of Contents Chapter 9: LightStream Switches Verifying an ATM Interface Connection Status ..................................................................................190 Viewing the Configured Virtual Connections ...........................
Table of Contents Chapter 10: Layer 2 Redundant Links Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface ...217 Configuring the Port Priority on a Set/Clear Command−Based IOS ..............................
Table of Contents Chapter 11: Multilayer Switching Assigning a VLAN ID ...................................................................................................................236 Adding an MLS Interface to a VTP Domain......................
Table of Contents Chapter 12: Hot Standby Routing Protocol Enabling Interface Tracking................................................................................................................252 Using the show standby Command...................
Table of Contents Chapter 15: The Standard Edition IOS [V] Virtual LAN ............................................................................................................................293 [R] Multicast Registration .........................
Table of Contents Chapter 16: Switch Troubleshooting Using the show log Command on a Set/Clear Command−Based IOS ................................................336 Configuring SPAN for Port Monitoring on a Set/Clear Command−Based IOS ............
Table of Contents Appendix E: Switch Features........................................................................................................................359 Access Layer Switches ............................................................
Cisco Switching Black Book Sean Odom Hanson Nottingham © 2001 The Coriolis Group. All rights reserved. This book may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review.
Steve Sayre Acquisitions Editor Charlotte Carpentier Product Marketing Manager Tracy Rooney Project Editor Toni Zuccarini Ackley Technical Reviewer Deniss Suhanovs Production Coordinator Carla J.
Jeff Duntemann VP and Editorial Director This book is dedicated to all those who endeavor to turn dreams into realities. —Sean Odom To my wife, Sonia, and my daughter, Sabrina. —Hanson Nottingham About the Authors Sean Odom is a CCNP, MCSE, and CNX−Ethernet.
Introduction Overview For many years I have been a consultant for different companies and have written books on switch and router configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or troubleshoot switching problems and configurations for switches without a good handbook.
Words in brackets that are separated by bars are used when indicating that there are multiple choices of commands. For example, when configuring VTP you can enable the trunk port to choose one mode: on, off, desirable, or auto mode. This will be shown like this: [on|off|desirable|auto].
Chapter 1: Network Switching Fundamentals In Depth Although writing the first paragraph of a book is probably the least important part, it’s invariably the most difficult section to write. To get a good picture of the different parts of networking, readers need to know where networking began and the history behind the networks of today.
Port switching —Takes place in the backplane of a shared hub. For instance, ports 1, 2, and 3 could be connected to backplane 1, whereas ports 4, 5, and 6 could be connected to backplane 2. This method is typically used to form a collapsed backbone and to provide some improvements in the network.
Many different types of physical cable media have been introduced over the years, such as Token Ring, FDDI, and Ethernet. At one time, Token Ring was seen as a technically superior product and a viable alternative to Ethernet. Many networks still contain Token Ring, but very few new Token Ring installations are being implemented.
Client/Server Network Model Peer−to−peer model networks evolved into the client/server model, in which the server shares applications and data storage with the clients in a somewhat more centralized network.
After each frame transmission, all stations on the network contend equally for the next frame transmission. This competition allows access to the network channel in a fair manner. It also ensures that no single station can lock out the other stations from accessing the network.
Six types of hubs are found in the network: Active hubs —Act as repeaters and eliminate attenuation by amplifying the signals they replicate to all the attached ports. • Backbone hubs —Collect other hubs into a single collection point. This type of design is also known as a multitiered design.
segment, it transmits the packet on that segment or port to that segment only. If the bridge does not know the destination segment, the bridge transmits a copy of the frame to all the interface ports in the source segment using a technique known as flooding .
Routers Routers are devices that operate at Layer 3 of the OSI Model. Routers can be used to connect more than one Ethernet segment with or without bridging. Routers perform the same basic functions as bridges and also forward information and filter broadcasts between multiple segments.
To improving network performance, switches must address three issues: They must stop unneeded traffic from crossing network segments. • They must allow multiple communication paths between segments. • They cannot introduce performance degradation.
designed the most efficient path to the destination. Single points of failure need to be analyzed, as well. As we stated earlier, every large−network user has suffered through his or her share of network outages and downtime.
Although the nodes on each port are in their own collision domain, the broadcast domain consists of all of the ports assigned to a particular VLAN. Therefore, when a broadcast is sent from a node in VLAN 1, all the devices attached to ports assigned to VLAN 1 will receive that broadcast.
bridged networks. To resolve the issue, your network administrator may even upgrade your PC to a faster CPU or more RAM. This allows your PC to generate more input/output (I/O), increasing the saturation on the network.
Poorly designed and implemented switched networks can have awful effects. Let’s take a look at the effects of a flat area topology and how we can design, modify, and upgrade Ethernet networks to perform as efficiently as possible.
Switched Forwarding Switches route data based on the destination MAC address contained in the frame’s header. This approach allows switches to replace Layer 2 devices such as hubs and bridges. After a frame is received and the MAC address is read, the switch forwards data based on the switching mode the switch is using.
Combining Switching Methods To resolve the problems associated with the switching methods discussed so far, a new method was developed. Some switches, such as the Cisco Catalyst 1900, 2820, and 3000 series, begin with either cut−through or FragmentFree switching.
Many types of physical media topologies can be applied to this concept. In this demonstration, we will utilize Ethernet 100BaseT. Ethernet 10BaseT and 100BaseT are most commonly found in the networks of today. We’ll make an upgrade to the network and alleviate our bottleneck on the physical link from the switch to each resource node or server.
We call a switch a blocking switch when the switch bus or components cannot handle the theoretical maximum throughput of all the input ports combined. There is a lot of debate over whether every switc.
Switched Ethernet Innovations Around 1990, many vendors offered popular devices known as intelligent multiport bridges; the first known usage of the term switch was the Etherswitch, which Kalpana brought to the market in 1990.
backward compatible to most of the equipment in use at the time. Although the standards bodies debated the merits of each of the camps, the marketplace decided for them. Fast Ethernet is the overwhelming winner, so much so that even HP sells Fast Ethernet on almost all its products.
devices run the same IOS. Some use a graphical interface, some use a Set/Clear command−line interface, and some use a Cisco Command Line Interface (CLI).
Router(config)#interface e0/0.? <0−4294967295> Ethernet interface number Router(config)#interface e0/0.1 Router(config−subif)# Let’s take a look at the commands available in the User EXEC .
snmp−server Modify SNMP parameters spantree Spanning tree subsystem spantree−template Set bridge template parameter storm−control Configure broadcast storm control parameters switching−mode Se.
multiple physical topologies, restricting broadcasts, and providing network security. Using switches and routers together, you can integrate large networks and provide a high level of performance without sacrificing the benefits of either technology.
Switch(config−if)#interface e0.1 Switch(config−subif)# Tip You can abbreviate any command as much as you want, as long as it remains unique (no other command exists that matches your abbreviation). For instance, the command interface e0.1 can be abbreviated as int e0.
Chapter 2: Basic Switch Configuration In Depth Throughout the last decade, Cisco has acquired some major switching vendors such as Kalpana and Crescendo. As a result, Cisco switches have a variety of command−line interfaces you need to be familiar with in order to set up and maintain the devices.
For security reasons, you should change the default password and add an enable password on the Crescendo and IOS CLI−based interface switches. In the next stage of the configuration, you should assign an IP address, subnet mask, and default route to the route processor for routing and management purposes.
Weighted fair queuing (WFQ)— Allows for multiple queues so that no one queue can starve another of all its bandwidth. WFQ is enabled by default on all serial interfaces that run at or below 2Mbps, except for those interfaces with Link Access Procedure, Balanced (LAPB), X.
The Distribution layer defines the boundaries for the network and provides packet manipulation of the network traffic. It aids in providing isolation from topology changes such as media translations, .
RMON provides support for the following groups of Token Ring extensions: MAC−Layer Statistics Group —A collection of statistics from the MAC sublayer of the Data Link layer, kept for each Token Ring interface.
Figure 2.2: The different types of console ports on the switches. The console port must be accessed through a PC or another device (such as a dumb terminal) to view the initial configuration.
7 7 8 8 Table 2.3: Rollover cable RJ−45−to−RJ−45 pinouts. RJ−45 RJ−45 1 8 2 7 3 6 4 5 5 4 6 3 7 2 8 1 Console Connectors Different console adapters connect different interfaces in order to connect to the console port.
Pin Signal Input/Output 1 RTS Out 2 DTR Out 3 TXD Out 4 GND N/A 5 GND N/A 6 RXD In 7 DSR In 8 CTS In Table 2.5: The RJ−45−to−DB−9 AUX port pinouts by color. Color RJ−45 DB−9 Brown 1 6 Blue 2 7 Yellow 3 2 Green 4 5 Red 5 5 Black 6 3 Orange 7 4 White 8 8 Table 2.
Table 2.8: DB−25−to−DB−9 connector pinouts. DB−25 Signal DB−9 2 TXD 3 3 RXD 2 4 RTS 7 5 CTS 8 6 DSR 6 7 GND 5 8 DCD 1 20 DTR 4 Switch IOSs Three types of Cisco operating systems are in use: Set/Clear command interface —Found on models of the Catalyst 2926, 2926G, 2948G, 2980G, 4000, 5000, 5500, 6000, and 6500 series of switches.
Privileged EXEC mode —The Privileged command set includes those commands contained in User EXEC mode, as well as the configure command, through which you can access the remaining command modes. Privileged EXEC mode also includes high−level testing commands, such as debug .
Setting the Login Passwords By default, Cisco switches have no passwords configured when they are shipped. On the Cisco IOS−based switches, different priority levels of authority are available for console access.
The time−out value is now set to five minutes, using seconds. Tip You can use the lock command to lock an unused Telnet session. After you issue the lock command, the system will ask you to enter and verify an unlocking password.
Configuring Port Speed and Duplex To configure the port speed—whether 10Mbps or 100Mbps—use the following commands: CORIOLIS5500(config) interface fastethernet 2/3 CORIOLIS5500(config−int) speed 100 CORIOLIS5500(config−int) duplex full The auto command can be used when the port on the other side is manually set.
Console> enable Enter password: Because you have not yet set a Privileged EXEC mode password, pressing Enter will put you into Privileged EXEC mode. The console will show the following prompt: 5. Console> (enable) You are now in Privileged EXEC mode.
Entering a Contact Name and Location Information Next, let’s set the contact name for the person or organization that is administering this switch. Use the following commands to set the switch conta.
sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 68.187.127.1 netmask 255.255.255.0 broadcast 68.187.127.1 Console> (enable) Configuring a Default Route and Gateway Data traffic not addressed to the local subnet or VLAN must be sent to a default route or destination.
SeansSwitch (enable) set port speed ? <mod/port> Module number and Port number(s) SeansSwitch (enable) set port speed 2/1 ? auto Set speed to auto <port_speed> Port speed (4, 10, 16, 100 or 1000) SeansSwitch (enable) set port speed 2/1−8 100 Ports 2/1−8 transmission speed set to 100Mbps.
Configuring a Menu−Driven IOS The Catalyst 3000 series has a menu−driven switch interface, which allows you to use the arrow keys on your keyboard to select the different options used to configure the switch. As with the other two types of interfaces, you need to connect the switch to a dumb terminal or PC.
Configuring the Console Port To configure the Console port, do the following: Choose Configuration|Serial Configuration. 1. As shown in Figure 2.5, you can configure four options: the Hardware Flow Control, the Software Flow Control, the Autobaud Upon Break feature, and the Console Baud Rate.
Figure 2.6: The menu−driven VLAN IP configuration screen. Related solutions: Found on page: Creating a Standard Access List 402 Creating an Extended Access List 403 Enabling Port Security 411 Config.
Configuring ROM ROM monitor is a ROM−based program that can be configured to execute upon the following conditions: Upon boot−up • Upon recycling the switch power • When a fatal exception erro.
Configuring SNMP RMON works in conjunction with SNMP and requires a protocol analyzer or probe to use its full features. To use SNMP−based monitoring, you need to verify that SNMP is running on your IOS−based switch. Verify that SNMP is running, using the following command in User or EXEC mode: show snmp 1.
read−write Administrators read−write−all Root Trap−Rec−Address Trap−Rec−Community ———————————————————————————— ———————————————————— 168.187.127.
Up arrow Recalls commands in the history buffer Down arrow Returns to more recent commands Ctrl+A Moves to the beginning of a line Ctrl+B Moves back one character Ctrl+D Deletes a character Ctrl+E Mov.
Chapter 3: WAN Switching In Depth Switches are not only used in LAN networks; they are also used extensively in wide area networks (WANs). Chapters 1 and 2 gave you an overview of LAN switching. Well, WAN switching is the same in some ways and completely different in others.
Figure 3.1: A packet’s journey from a host to a WAN device. The WAN transmission is continuous and does not have to wait for acknowledgement or permission.
The capability of broadband to carry multiple signals enables it to have a higher transmission speed. Table 3.2 displays the various broadband transmissions, which require more expensive and specialized transmitters and receivers. Table 3.2: The different broadband transmission types and their bandwidth.
STS− n is an interleaving of multiple ( n ) STS−1s. The size of the payload and the overhead are multiplied by n . Figure 3.4 displays an STS diagram. Figure 3.4: The STS−1 framing and STS− n framing. The overhead and payload are proportionate to the n value, with the STS−1 frame as the base.
ATM frame user−network interface (UNI), or System Network Architecture (SNA). The MGX 8240 Private Line Service Gateway is designed to terminate private lease lines (T1, T3, or DS0). It has 16 slots with 1 reserved for a redundant control card. It can support up to 1,260 channelized T1s.
The BPX 8620 is a pure ATM broadband switch. It has a nonblocking 9.6Gbps architecture. The interface modules range from T3 to OC−12. Each trunk port can buffer up to 32,000 cells. The OC−12 interface module has two OC−12 ports. The OC−3 interface module has eight OC−3 ports.
The system bus backplane contains multiple buses for connecting the modules. It has no active component. Different buses provide power to the modules, transfer of data, timing control, system commands, and other functionality. Cisco WAN Switch Network Topologies We’ve talked about the transmission media, the signal, and the equipment.
nodes in the domain have limited contact with switches outside the domain. You will rarely see this design today, because the current switching software no longer supports it. Network Management In managing a wide area network, you have to understand the basic network management technology common to both LANs and WANs.
the network while highlighting any local problems. Connection Management —Provides a graphic interface to configure WAN switches. It provides templates to minimize the work in setting up many connections. All interface modules are supported, including VoIP/VoATM setups.
Using the History Command You can display a list of the previous 12 commands by pressing the period (.) key; this command has a privilege level of 6. You can select which command to repeat by entering a number from 1 through 12. (Entering “1” repeats the most current command, “5” repeats the command five back in the list, and so on.
service, or StrataCom level. Displaying Other Switches To display a list of known switches, use the dspnds command. This command is privilege level 6. You should see only the one switch on the display until connectivity is established with other switches.
Accessing the MGX 8850 and 8220 The MGX 8850 has a control port, maintenance port, and LAN port. The control port is an EIA/TIA−232 Data Communications Equipment (DCE) interface. To access the control, you must use a terminal or a PC with a terminal emulation program.
Displaying a Summary of All Modules The command dspcds will display the summary information of all the modules. This is a level 6 command. The card number, card status, card type, switch name, date, time, time zone, and IP address are all displayed. The information is displayed one screen at a time.
Configuring the IP Interface The command cnfifip is used to set the IP address, netmask, and broadcast address. Each parameter must be entered one at a time.
Chapter 4: LAN Switch Architectures In Depth Knowing the internal architectures of networking devices can be a great asset when you’re working with Cisco switches.
Single BUS vs. Crossbar Matrix A single−BUS architecture is pretty simple: One BUS connects all the ports together. This setup creates a bandwidth problem called a blocking architecture , or what the networking industry likes to call over−subscription .
Synergy Advanced Multipurpose Bus Arbiter (SAMBA) ASIC • EARL ASIC The Encoded Address Recognition Logic (EARL) ASIC performs functions that are very similar to those of the Content Addressable Memory (CAM) table. Switches use this CAM to make filtering and forwarding decisions.
This ASIC operates in either master or slave mode. In master mode, the ASIC allows ports access to the bus based on a priority level of normal, high, or critical. In slave mode, each port must post a request to each SAMBA ASIC, negotiate local port decisions, and arbitrate requests with the Supervisor Engine’s SAMBA ASIC.
ARB The Arbiter (ARB) is located on each line module. It uses a two−tiered method of arbitration to assign queuing priorities and control data traffic through the switch.
through which all switched ports communicate. The AXIS bus is a partially asynchronous time division multiplexed bus used for switching packets between heterogeneous LAN modules.
Per−destination load balancing —Enabled by default when you enable CEF. It allows multiple paths to be used for load sharing. Packets destined for a given destination or source host are guaranteed to take the same path, although multiple destinations are available.
Figure 4.3: Cisco Express Forwarding ASIC components. Note CEF supports Ethernet, Fiber Distributed Data Interface (FDDI), Point−to−Point Protocol (PPP), High−Level Data Link Control (HDLC), Asynchronous Transfer Mode (ATM)/AAL5snap, ATM/AAL5mux, ATM/AAL5nlpid, and tunnels.
connected to the QMAC ASIC. QMAC The QMAC uses four protocol handlers to support four Token Ring physical interfaces directly connected to the QTP ASIC. Together, these two ASICs provide support for early token release (ETR) and Token Ring Full Duplex (FDX) concentrator and adapter modes for dedicated Token Ring.
Source Route Transparent Bridging Source Route Transparent Bridging (SRT) is a combination of SRB and TB. SRT bridges make forwarding decisions based on either the Routing Information Field (RIF) for the destination or the MAC address in the frame. Some protocols attempt to establish a connection using a frame without using a RIF.
Switching Paths The switch is commonly referred to in marketing terms as a Layer 2 device. If you keep thinking that way, this section will confuse you. By definition, switching paths are logical paths that Layer 3 packets follow when they are switched through a Layer 3 device such as a router or internal route processor.
Autonomous Switching With autonomous switching, when a packet arrives on an interface, it is forwarded to the interface processor. The interface processor checks the silicon−switching cache; if the destination address is not contained in that cache, the autonomous cache is checked.
The first packet that’s copied to the NetFlow cache contains all security and routing information. If policy networking (such as an access list) is applied to an interface, the first packet is matched to the list criteria.
Booting the Supervisor Engine III from Flash To boot from a Flash device, use the following command: boot [device][image name] Note If you do not specify an image file name, the system defaults to the first valid file in the device. Remember that file names are case sensitive.
Enabling dCEF To enable dCEF operation, use the following command: ip cef distributed Disabling dCEF To disable dCEF operation, use the following command: no ip cef distributed Warning Never disable dCEF on a Cisco 12000 series.
show ip cef Viewing CEF Packet−Dropped Statistics To view the number of packets dropped from each line card, use the following command: show cef drop Viewing Non−CEF Path Packets To view what pack.
Enabling Telnet Session Logging on a Set/Clear Command−Based IOS To enable session logging for a Telnet session, use the following command: set logging session enable Disabling Console Session Loggi.
You can use the logging timestamps in your system logging to help you keep track of when events happen. To enable the logging time stamp, use the following command in Privileged mode: Catalyst5000> (enable) set logging timestamp enable System logging messages timestamp will be enabled.
Displaying the Logging Configuration Use the show logging command to display the current system message logging configuration. Use the no alias keyword to display the IP addresses instead of the host names of the configured syslog servers.
do not specify the number of messages, the default is to display the last 20 messages in the buffer ( −20 ). To display the first five messages in the buffer, use the following code: Catalyst5000>.
Chapter 5: Virtual Local Area Networks In Depth Faced with the problems of a slow network, many network administrators make expensive mistakes. Several times, I have come across companies that have a fiber link to every desktop. In fact, an architectural firm I consulted for comes to mind.
the network. The processors in each node handle this task, which takes away from the processing power needed for other tasks and application—thus causing a slowdown that the users discover and complain about. Most network administrators pass off this slowness as a problem with the PCs, and the most vital PCs are rebuilt or replaced.
VLAN Basics Inter−Switch Link (ISL) protocol was designed to allow VLAN traffic to flow from one Cisco device to another. The protocol adds a header that uniquely identifies the source and destinations of the data as well as the VLAN the data is a member of.
processing). Broadcasts are used in each and every networking protocol. How often they occur depends upon the protocol, the applications running on the network, and how these network services are used.
This setup allows for a more secure network. In addition, network administrators now have more control over each port as well as the ability to deny the user based on the Layer 2 or Layer 3 address the user is using to access the port.
VLAN Membership Policy Server (VMPS, discussed in the next section). In this situation, the administrator must have very defined goals, and network planning must be more detailed so as to not create bottlenecks in the WAN.
Cisco also recommends a one−to−one ratio between VLANs and subnets. This means that you must understand how users are broken up by subnets. If you have 1,000 users in a building and 100 users are in each subnet, then you should have 10 VLANs. VLAN Trunking There are two types of VLAN links: a trunk link and an access link.
IEEE 802.10 • IEEE 802.1Q • Inter−Switch Link (ISL) • LAN Emulation (LANE) • IEEE 802.10 The IEEE 802.10 standard is used to send VLAN information over a Fiber Distributed Data Interface (FDDI) physical link. In this situation, ISL is disabled and IEEE 802.
Unlike ISL, IEEE 802.1Q is not a Cisco proprietary protocol. It can be used to carry the traffic of more than one subnet down a single cable, and it is compatible with devices that are not running the Cisco IOS. 802.1Q changes the frame header with a standard VLAN format, which allows multiple−vendor VLAN implemen−tations.
High bit of source address (HSA) —The 3−byte manufacturer’s portion of the SA field or vendor field of the source port’s MAC address. • 15−bit descriptor —Used to distinguish the frame from other VLANs or colors. 10 bits are used to indicate the source port.
VTP Versions VTP comes in two versions: version 1 and version 2. The primary differences between the two version are few, but they are significant enough to render the two versions incompatible. The two versions will not work together in the same network.
the updater’s identity, the updater’s timestamp, and the MD5 digest field. Subset advertisement —Contains very detailed information about the network, including the version, code, sequence number, management domain name, configuration revision number, and VLAN information fields.
Many network administrators make the mistake of using the clear config all command, believing that it will erase the current revision number. Doing so is a bad mistake on the network administrator’s part. This command doesn’t do what it says it does—it doesn’t really “clear all.
Server Mode Server mode, which is configured by default, allows you to create, modify, and delete VLANs for the management domain. Configuration changes are then sent to all other participating members of the VTP domain. At least one VTP server should exist in the VTP management domain.
than a simple hub can achieve. This ability enables a switch to take the place of another device, called a repeater. A repeater is a device dedicated only to data regeneration. Repeaters allow data to be forwarded over greater distances, allowing the data to overcome regular data distance limitations for the type of physical media being used.
Figure 5.4: An example of an external router routing interVLAN traffic. Configuring a Static VLAN on a Catalyst 5000 Series Switch The Cisco Catalyst 2900G series, 5000 family, and 6000 family of switches use the Cisco Set/Clear−based CLI.
User Interface Menu [M] Menus [K] Command Line [I] IP Configuration Enter Selection: K Once a CLI session on the switch is open, you must create a VLAN number and name. The command used to do this is as follows: vlan [ vlan# ] name [ vlan name ] command To use this command, you must be in Global Configuration mode on the switch.
Viewing the VLAN Configuration on a 1900 Series Now that we have created the VLANs we want, we can use the show vlan command to see the configured VLANs.
(vlans = 1..1005 An example of vlans is 2−10,1005) (trunk_type = isl,dot1q,dot10,lane,negotiate) The different port negotiation types are described in Table 5.1, and the different trunk encapsulation types are described in Table 5.2. Table 5.1: Port negotiation syntaxes for configuring VLAN trunks.
Mapping VLANs to a Trunk Port In the last example, we assigned port 2/1 as a trunk port using ISL encapsulation. Notice that we did not specify the VLANs to trunk.
To remove VLAN 2 from a trunked port use the following command: 1912(config−if)#no trunk−vlan 2 1912(config−if)# Note No command is available to clear more then one VLAN at a time on the 1900.
5000> (enable) set vtp v2 enable This command will enable the version 2 function in the entire management domain. All devices in the management domain should be version2−capable before enabling.
Configuring VTP Pruning on a Catalyst 1900 Switch To configure the switch for VTP pruning, use the following command: 1912(config)# vtp pruning Configuring VTP on a Set/Clear CLI Switch Before you can configure a router or internal route processor for interVLAN routing, you must enable VTP, assign a mode, and configure a domain.
1900EN(config)#vtp domain Coriolis 1900EN(config)# To set a VTP domain password on a 1900EN to “pass1” use the following command: 1900EN(config)# vtp password pass1 1900EN(config)# Verifying the VTP Configuration on a Set/Clear CLI To verify the VTP domain information, use the command show vtp domain .
Digest Errors 0 VTP Pruning Statistics: Port Join Received Join Transmitted Summary Adverts received with no pruning support ———— ————————————— ———————.
Specify an IP routing protocol such as Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Internet Gateway Routing Protocol (IGRP), or Enhanced IGRP (EIGRP) and identify the network: Cisco7505(config)#router rip Cisco7505(config−router)#network 192.
Chapter 6: InterVLAN and Basic Module Configuration In Depth One of the first things you will discover in this chapter is that switch is merely a marketing term.
The FIB maintains a copy of the forwarding information contained in the IP routing table based on the next−hop address. The routing table is updated if routing or topology changes are detected in the network. Those changes are then forwarded to the FIB, and the next−hop information is recomputed based on those changes.
proprietary protocol transfers the FIB information to a NetFlow Feature Card (NFFC or NFFC II) on a Cisco Catalyst 5000 series, or to another forwarding board or module on the higher−speed Cisco distributed switches.
segments, networks, or the Internet. A few types of route processors are available for Catalyst switches. They include: NetFlow Feature Card and NetFlow Feature Card II • Route Switch Module • Rou.
NFFC also provides protocol filtering to allow segmentation by VLANs. It can provide per−port filtering of data in four different groups: Internet Protocol (IP) • Internetwork Packet Exchange (IPX.
load−balance the channels. VLAN 0’s MAC address is the address assigned to the programmable ROM (PROM) on the line communication processor (LCP) located on the RSM. This MAC address can be used for diagnostic purposes and to identify the RSM’s slot number.
EIGRP checks its topology table for a suitable new route to the destination. If a route exists in the table, EIGRP updates the routing table with the new route and purges the old route from the table. Unlike other routing protocols, EIGRP saves WAN−link bandwidth by sending routing updates only when routing information changes.
Figure 6.1: The Catalyst Supervisor Engine I and II. Media Access Control Addressing and VLANs —Support for 16,000 active MAC addresses for up to 1,024 VLANs allocated dynamically between active ports. • Management —Support for Simple Network Management Protocol (SNMP) for statistical management.
Figure 6.3: The Catalyst Supervisor Engine III G. Gigabit Interface Converter (GBIC) for use with multimode fiber (MMF) or single−mode fiber (SMF) interfaces using SC connectors • An MCF5102 proce.
The auto syntax allows the port to autonegotiate the port speed. On an Ethernet or Fast Ethernet interface, use the command set port duplex mod_num/port_num {full|half|auto} to set the port duplex mode. Again, the auto syntax can be used to allow the port to autonegotiate the duplex mode.
—— —————————————————————————————————————— ——— ——— ———— 1 00−40−0b−80−54−00 to 00−40−0b−80−57−fi 2.0 3.1.2 4.3(la) 2 00−40−0b−03−5d−58 to 00−40−0b−03−5d−6f 3.
Router> Enter Global Configuration mode with the following commands: Router> enable Router# configure terminal Warning When you make changes in this mode, they must be saved to NVRAM. Otherwise, the next time you recycle the switch, the changes will be lost.
———— ——————————— ———————— ———— ————— —————— ————— —————— 2/3 FileServer1 connect 1 normal a−half a.
Note The commands for configuring the RSM, RSFC, and MSM are the same. Viewing the RSM’s Running Configuration To view the RSM’s running configuration, use the show running−config command as shown here: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.
RSM1>enable RSM1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM1(config)#interface vlan 2 RSM1(config−if)# %LINEPROTO−5−UPDOWN: Line protocol on Interface Vlan2, changed state to down Assign IP addresses to the VLAN interfaces: 3.
Router# Viewing the RSM Configuration Just as on a router, you use the show running−config to view the running configuration: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.
1 00−60−15−be−55−80 2/1 Total Matching CAM Entries Displayed = 7 Configuring Filtering on an Ethernet Interface To configure protocol filtering for IP only, follow these steps: To configure protocol filtering on the Ethernet, Fast Ethernet, or Gigabit Ethernet ports, you must first enable protocol filtering on the switch.
Port Single−Col Multi−Coll Late−Coll Excess−Col Carri−Sen Runts Giants ———— —————————— —————————— ————————— —————.
Configure the password for Enable mode. Press Enter for the old password if none has ever been configured: Catalyst5000> (enable) set enablepass Enter old password: Enter new password: coriolis2 Retype new password: coriolis2 Password changed. Catalyst5000(enable) 4.
Several other commands can be used to configure the Supervisor Engine. The following list shows some of them: set boot config−register ignore−config enable —Sets the switch to ignore the content.
Fw : 4.3(1) Sw : 5.5(2) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free —————— ————— ———— ————— —————— ————— —.
Configuring Redundancy Using HSRP To configure HSRP on router interfaces, perform the following steps: Enter Interface Configuration mode and identify a standby group and an IP address: standby [group−number] ip [ip−address] 1. Identify the priority for the HSRP interface.
RSM2(config−if)#standby 10 authentication Secret RSM2(config−if)#interface vlan20 RSM2(config−if)#ip address 172.16.20.2 255.255.255.0 RSM2(config−if)#no shutdown RSM2(config−if)#standby 20 ip 172.
Chapter 7: IP Multicast In Depth Over time, our use of computers has moved from the local desktop to the local network. Most of this network traffic consists of using local network sources, such as printing and file transfers. As our personal computers become more powerful, the applications that we use now contain more audio and video components.
Unicast • Multicast • Broadcast In its simplest form, broadcast traffic consists of packets that reach every point of the network. In a typical network, broadcasts are stopped at the router.
Figure 7.2: Unicast traffic flow. Multicast Multicast is a combination of broadcast and unicast. It sends one copy of the packet to many hosts that requested it, thereby using less bandwidth. It also saves bandwidth by not sending the packet to the portion of the network whose hosts didn’t request the transmission.
each other and with the server by multicast. When an individual driving a tank or a fighter enters a grid square, it joins the multicast group to receive that square’s simulation traffic. As the individual moves from square to square, the individual’s multicast group membership changes.
The X bits are not used. The remaining bits 000 1010 0000 1000 0000 0101 give you 0a:08:05. Put that result together with 01:00:5e: and you get 01:00:5e:0a:08:05.
Address Destination .1 All systems in this subnet 224.0.0.2 All routers in this subnet .4 Distance Vector Multicast Routing Protocol .5 Open Shortest Path First (OSPF) routers .6 Open Shortest Path First (OSPF) designated routers .7 Routing Information Protocol 2 (RIP2) routers .
shortest path tree (SPT) because it uses the shortest path to reach the destination. This design functions very well in a one−to−many model, but it has drawbacks when used in a many−to−many model. For example, a live concert has only one source, so there will be only one distribution tree in the router for the multicast group.
Distance Vector Multicast Routing Protocol DVMRP is based on RIP and is widely used. Just like RIP, it uses a distance vector (hops) and sends out periodic route updates. It’s different from RIP in that it is classless and has a hop limit of 32 rather than 16.
receive the multicast traffic sends a PIM join message toward the root node (rendezvous point). As this join message travels up the tree, the multicast routers along the way forward the requested traffic back down the tree to the destination. To put it in a simple form, PIM−DM will send the multicast traffic everywhere until it is told not to.
responses, it will build a list of all the multicast groups for that interface. Any other router on the same subnet will also receive the responses and will have the same information. Note A host does not have to wait for a host membership query to send out a membership report.
Time to Live Using the IP time to live (TTL) field is an important IGMP topic. The TTL field is a value in an IP packet that tells a network router whether the packet has been in the network too long and should be discarded. A multicast datagram with a TTL of 0 is allowed only on the same host.
This process looks simple. As a host joins the multicast group, its port number is added to the CAM table; as the host leaves, its port is removed from the CAM table. However, this entire process forgets about the switch’s processor. The switch must also receive the multicasts in order to receive the join and leave messages.
GARP Multicast Registration Protocol Generic Attribute Registration Protocol (GARP) Multicast Registration Protocol (GMRP) prevents multicast flooding on the switch. This protocol provides a way for the host to communicate with the switch at the MAC level.
Configuring the Rendezvous Point You can configure the rendezvous point (RP) manually or let it be auto−discovered. To configure the RP manually, you have to configure the routers that have either the sender of the multicast traffic or the receiver of the multicast traffic connected to its segment.
Changing the IGMP Host−Query Message Interval As mentioned earlier, the router sends IGMP host−query messages to the network to discover which multicast group is still active.
———— ———————— 2/14 * 3 3/1 1 Total Number of Entries = 2 ‘*’ − Configured The asterisk between the port and the VLAN number means the multicast router port was manually configured.
Displaying IGMP Statistics To display IGMP statistics for all VLANs, use the show igmp multicast statistics command as shown here: Coriolis> (enable) show igmp statistics IGMP enabled IGMP fastleav.
Total Number of Entries = 1 To get more detail about the multicast groups, use this command: Coriolis> (enable) show multicast group [ vlan ] CGMP disable IGMP enable VLAN Dest MAC/Route Des Destin.
valid igmp leaves received 0 valid igmp queries received 568 igmp gs queries transmitted 0 igmp leaves transmitted 0 failures to add GDA to EARL 0 topology notifications received 10 number of CGMP packets dropped 2456875 Configuring RGMP on the Switch RGMP is disabled by default.
To display the total number of RGMP groups, use the following command: Coriolis> (enable) show rgmp group count [ vlan ] Total Number of Entries = 2 Displaying RGMP−Capable Router Ports To displa.
Disabling GMRP To disable GMRP globally, use the following command: Coriolis> (enable) set gmrp disable GMRP disabled. Enabling GMRP on Individual Ports You can enable GMRP on a per−port basis using this command: Coriolis> (enable) set port gmrp enable 2/1−12 GMRP enabled on ports 2/1−12.
To configure Fixed mode, use the following command: Coriolis> (enable) set gmrp registration fixed 2/1 GMRP Registration is set fixed on port 2/1. To configure Forbidden mode, use the following command: Coriolis> (enable) set gmrp registration forbidden 2/1 GMRP Registration is set forbidden on port 2/1.
GMRP and GARP are interchangeable for the set and show commands. GMRP is considered an alias of GARP. Configuring Bandwidth−Based Suppression Bandwidth−based suppression is a hardware−based suppression method. The threshold is set as a percentage of the port’s bandwidth.
Chapter 8: WAN Cell Switching In Depth WAN switching is defined as the process of forwarding data traffic across a wide area network. WAN switching uses cell relay technology to multiplex all network traffic across WAN trunk links without a predefined timeslot for each type of connection.
Scalability —ATM is highly flexible, accommodating a wide range of traffic types, traffic rates, and communications applications. • An ATM network includes two types of devices: ATM switches and ATM endpoints.
ATM Protocols The protocols used in ATM have been specifically designed to support high−speed networks at speeds ranging up to gigabits per second (Gbps). Other physical LAN topologies, such as Gigabit Ethernet, provide high−speed networking and work very well in LANs.
the result by 2—and thus the data portion of the ATM cell contains 48 bytes. Figure 8.1: The ATM cell. The fixed size of the ATM cells provides some the following benefits: Efficient bandwidth use o.
The ATM Cell Header The ATM cells can be found in one of two formats, depending on whether the endpoints are a UNI or an NNI connection. The two differ in one way: The NNI header does not contain a Generic Flow Control (GFC) field. The NNI header has a Virtual Path Identifier (VPI) that occupies the entire first 12 bits.
ATM layer is responsible for establishing connections and passing cells through the ATM network. The ATM Adaptation layer translates the different types of network traffic.
The ATM Adaptation Layer The ATM Adaptation Layer (AAL) provides the translation between the larger service data units of the upper layers of the OSI Reference Model and ATM cells. It works by receiving packets from the upper−level protocols and breaking them into 48−byte segments to be dumped into the payload of an ATM cell.
Variable bit rate−real time (VBR−RT) —Typically used for connections that carry VBR traffic in which a fixed timing relationship exists between either VBR video or voice compression.
changing the application itself or Layer 3 drivers. This approach allows backward compatibility with existing LANs, broadcast support, and connectionless delivery. LANE has some drawbacks, however: It prevents the use of ATM−specific benefits such as QoS and doesn’t have the ability to provide flexible bandwidth allocations.
Broadcast and Unknown Server (BUS) —Sends broadcasts, sequences cells, controls unicast flooding, and distributes multicast packets. • Warning Notice that although LEC and LECS sound the same, they are completely different terms and components in LANE.
The ultimate goal of the LES is to arrange and control connections with a LEC. This connection is commonly known as a control direct ATM virtual channel connection (VCC) . After this connection is established, it will handle address resolution and registration responses.
Broadcast and Unknown Server (BUS) The BUS provides broadcasting support for an ELAN. The BUS distributes multicast data, sends or distributes unicast data, and connects the other LANE components.
The default ELAN name • The LEC address and corresponding LES • The ELAN name and corresponding LES • The ATM address prefix and corresponding LES • The ELAN type and corresponding LES • The.
In the ATM LANE communications process, when a client wants to join an ELAN, the client must build a table that links ATM addresses to Ethernet MAC addresses. Let’s take a close look at this process: The LEC first sends a LAN Emulation ARP (LE_ARP) message to the LES that is using a point−to−point configure direct VCC.
LE_ARP_REQUEST —Contains the broadcast MAC address 0xFFFFFFFF. This packet is sent on a control direct VCC to the LES to query for the ATM address of the BUS. • LE_ARP_RESPONSE —Sent in response to an LE_ARP_REQUEST; it contains the ATM address of the BUS.
Let’s step through the process. Suppose that you were working on an ELAN and you wanted to access a file stored on a server that was located on a physically separate LAN: You send the file request. Your LEC determines if it knows the ATM address of its LES.
LANE Modules The following ATM LANE modules are available for the 5000 family of switches; the list also indicates the cable types that can connect to each. Tables 8.1 and 8.2 show the LED lights and functions on the LANE modules. These modules provide a connection between multiple ATM networks connecting through the ATM switch: Table 8.
Supervisor Engine’s console port. Tip Even though the LANE module is configured through the Supervisor Engine, the Supervisor Engine maintains no configuration information regarding the LANE module. This information is stored on the LANE module itself.
After the destination node receives the LE_ARP response from the LES, the destination client responds to the source with its address information. The source sends a “flush” message to the BUS, whi.
LANE Server: 47.00817200000000E04BAAA006.00E04BAAA061.** LANE Bus: 47.00817200000000E04BAAA006.00E04BAAA062.** LANE Config Server: 47.00817200000000E04BAAA006.00E04BAAA063.00 note: ** is the subinterface number byte in hex Note The asterisks in this example indicate that the addresses are in hexadecimal.
ATM(config)#interface atm0.1 Map the LEC bus to the Ethernet ELAN named “default”: ATM(config−subif)#lane client ethernet default 3. Repeat Steps 2 and 3 for each LEC you want to configure on this LANE module. 4. Enter Interface Configuration mode for the ATM0 subinterface 2: ATM(config−subif)#interface atm0.
Configuring the LECS Prior to configuring the LECS, you will need to go to each LES and get its ATM address. This address can be gathered with the following command: ATM#show lane server LE Server ATM0.1 ELAN name: default Admin: up State: operational type: ethernet Max Frame Size: 1516 ATM address:47.
ATM(config−if)#lane config database ELAN2 ATM(config−if)#end Verifying the LECS Configuration Verify the proper setup with the following command: ATM#show lane config LE Config Server ATM0 config table: ELAN2 Admin: up State: operational LECS Mastership State: active master list of global LECS addresses (58 seconds to update): 47.
Chapter 9: LightStream Switches In Depth The demand for high−speed network communications has skyrocketed in the past 20 to 30 years. In the early 1970s, 9.6Kbps was considered a high−speed network. Now that we have entered the next century, network speeds have surpassed 1Gbps with the introduction of 10Gbps technologies.
FDDI 100Mbps STS−3c/STM−1 155Mbps TAXI 4B/5B 100Mbps LightStream 1010 The LS1010, shown in Figure 9.2, is the most recent addition to the LightStream series of ATM switches used for multiservice applications. The switch has a five−slot, modular chassis with two fault−tolerant, load−sharing power supplies.
UBR + MCR A unique Cisco class for best−effort data traffic delivery with a specified minimum bandwidth. This class is used in a LAN for high−end resource applications or in a WAN with an ATM for a guarantee of a certain amount of bandwidth (also called a committed information rate [CIR]).
Neighborhood Discovery Function The neighborhood discovery function (NDF) can be used to provide a means for locating all the other nodes in the network and to simplify the network configuration process. This tool helps to eliminate the need to manually configure some of the attributes of interface modules inside the LS2020 switch.
algorithm to determine the path for any data that arrives and needs to be switched through the network. The routing algorithm calculates the minimum distance path through the network, verifies the availability of bandwidth, and then sets up a connection between the two ATM endpoints in the network.
Default settings are in square brackets ’[]’ Would you like to enter the initial configuration dialog? [yes] From this prompt, you can enter the initial configuration dialog or decline and manually enter the configuration. This choice allows an administrator to use the Command Line Interface (CLI) on the LightStream switch.
The MPC Configuring an MPC on a router provides router−initiated and router−terminated shortcuts for non−NBMA networks. The MPC functionality involves the following: Data−plane and control−p.
CoriolisLS1010> enable Use the config terminal command to enter Global Configuration mode: CoriolisLS1010# config terminal 2. You must identify the route for traffic to take to the internal network (referred to as a static route ) using the ip route command, as shown here: CoriolisLS1010(config)# ip route 63.
IF−Side: Network IF−type: NNI Uni−type: not applicable Uni−version: not applicable CoriolisLS1010# Viewing the Configured Virtual Connections To view the configured virtual connections, use th.
control distribute: vcd 1452, 3 members, 196 packets proxy/ (ST: Init, Conn, Waiting, Adding, Joined, Operational, Reject, Term) lecid ST vcd pkts Hardware Addr ATM Address 1 O 1451 6 0060.705a.8f02 47.0091810000000060707B8A01.0060705A8B12.01 2 O 1455 10 00e0.
——— ———————— ————————— —————————— —————— 2 EARL 1+ WS−F5511 0002278010 1.0 Mod SMT User−Data T−Notify CF−St ECM−St Byp.
To identify an MPS with a specific name, use the following command: mpoa server config name mps−name 1. The ATM address that specifies the control ATM can be optionally identified using this command: atm−address atm−address 2. To specify the network ID, use the following command: network−id id 3.
Use the lane client ethernet command followed by the name of the ELAN to configure a LANE client: 5. CoriolisLS1010(config−if)# lane client ethernet elan−name Powering on the LightStream 100 ATM S.
Recovering a Lost Password To recover a password, such as that used for the root account, look at the following example (the output is quite long, so unnecessary information has been omitted): Type ‘. to get a Test and Control System (TCS) hub prompt.
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000 LynxOS/68040−MVME167 Version 2.1.0 Copyright 1992 Lynx Real−Time Systems Inc. All rights reserved. LynxOS release 2.1.0, level 1: NP−LynxOS #112: compiled Nov 08 1994 19:49:33 Single−user boot single−user$ Type ’.
user name: coriolisuser password: This process changes the password and recovers any lost passwords. 198.
Chapter 10: Layer 2 Redundant Links In Depth If your company has ever experienced a critical work stoppage due to a downed server or a network outage, you understand how critical it is to implement redundancy in your network. No matter what happens with an individual link in your network, the other links should take over using redundant links.
Broadcast frames • Multicast frames • Unknown unicasts • Broadcast and Multicast Frames Broadcast and multicast frames are unique in that neither has a specified destination hardware address. The source address is also the hardware address of the device that sent the frame.
and Electronics Engineers (IEEE) a protocol similar to STP to become a networking standard. However, after the IEEE 802 committee revised it into what is now known as the IEEE 802.1D standard (Spanning Tree Protocol), the protocol differed just enough from DEC’s version that they were incompatible.
Figure 10.2: An example of a directed graph. STA assigns each switch in the network a unique identifier. This identifier is one of the switch’s MAC addresses, as well as an assigned priority (explained in more detail later in this chapter in “The Selection Process”).
Figure 10.3: The root bridge calculating the path cost to switch D. The lowest calculated path is not always the most ideal path. For example, if multiple high−speed links to a destination exist, the links may total more than the cost of a very slow link, such as a modem.
Version —Contains 1 byte and the value of zero. • Message Type —Contains 1 byte and the value of zero. • Flag —Contains 1 byte; only the first 2 bits are used.
Parent and Child Switches A switch’s diameter is a unit of measurement between the root switch and child switches. The root bridge counts as the first switch. Each subsequent child switch out from the root bridge is counted to yield the diameter number.
Secondary root bridge priority 16,384 Root bridge priority 8,192 The switches participating in STP (other than the root bridge) must form an association with the root bridge shortly after the root bridge has been elected. Each switch examines each BPDU as it arrives on each port.
Equal Cost Paths If two or more links have the same root path cost, such as two identical links running between two switches, STA has a problem choosing the designated port or a root path through the network using the lowest path cost. The bridge ID is used to determine the root bridge in the network and also the root port.
For example, the downtime caused by using the defaults would be the following: 2 * 15 + 20 = 50 seconds Now that you have learned about the timers and how BPDUs operate in the network, let’s take a closer look at how ports transition through different states before forwarding data.
Per−VLAN Spanning Tree You can have many instances of STP running in your network. By running a different instance of STP on a per−VLAN basis, you can run some VLANs on ports that are blocked by another instance of STP running on another VLAN.
the network. Thus, eight wires can be used to simulate one link able to handle up to 800Mbps and load balance data across those links, as shown in Figure 10.7. Figure 10.7: Eight equal−cost links between two switches, creating a bundle of eight channels acting as a single link.
capability. The channel is then added to the spanning tree as a bridge port. Warning Dynamic VLAN ports can force a VLAN change; as a result, PAgP cannot be used to form a bundle on ports that are configured for dynamic VLANs. The VLANs must be static VLANs, meaning that the port on the switch must be assigned to a VLAN.
The switch must have at least one blocked port. • The failure must be on the root port. • If a link fault occurs on the primary root link, UplinkFast transitions the blocked port to a forwarding state. UplinkFast changes the port so that it bypasses the listening and learning phases.
Enabling STP on a Set/Clear Command−Based Switch for All VLANs To enable STP on all VLANs, use the following command in Privileged mode: set spantree enable all Related solutions: Found on page: Con.
Bridge Max Age 20 Sec Hello Time 2 sec Forward Delay 15 sec Port vlan Port−State Cost Priority Fast−start Group−Method ———— ———— —————————— ———— —.
Viewing the STP Configuration on a Command Line Switch To view the configuration, you use the same command you use for the Set/Clear command−based switches.
secondary (optional) Used to designate the switch as a secondary root switch if the root bridge fails. The default priority of the secondary bridge is 16,384. n (optional) Specifies the VLAN. If you do not specify the VLAN, VLAN 1 is used. The valid value range is 1 through 1,005.
This example uses 100 as the port cost: spantree cost 100 Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface To verify the port cost on the port configured .
Verifying the STP Port Priority on a Set/Clear Command−Based Switch To verify the proper port priority setting, use this command (only the module and port numbers are required): show spantree < m.
Adjusting the MaxAge Timer on a Set/Clear Command−Based IOS To change the default MaxAge timer for a particular VLAN, use this Privileged mode command : spantree maxage < time value > < VLA.
Channel 2/1−2,2/1−4 Broadcast suppression percentage(0−100) Flow control receive−(off,on),send−(off,on) Security yes Membership static,dynamic Fast start yes QOS scheduling rx−(none),tx−(none) CoS rewrite yes ToS rewrite IP−Precedence Rewrite yes UDLD yes AuxiliaryVlan 1.
another port that is in the desirable or auto mode. Verifying the EtherChannel Configuration To verify the EtherChannel configuration on a Set/Clear command−based switch, use this command: catalyst5.
group ———— ———— —————————————————————————————— ————————————— ———————— 10 2/1 10 2/.
catalyst5000> (enable) show interface sl0: flags=51<UP,POINTOPOINT,RUNNING> slip 0.0.0.0 dest 0.0.0.0 sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 208.
Disabling PortFast on a CLI−Based IOS Switch To disable PortFast on a Cisco IOS command−based switch, use this Interface Configuration mode command: no spantree start−forwarding Verifying the Po.
You must clear the port and bridge costs modified by UplinkFast using the clear spantree uplinkfast command shown below: catalyst5000> (enable) clear spantree uplinkfast This command will cause all portcosts, portvlancosts, and the bridge priority on all vlans to be set to default.
Viewing the UplinkFast Configuration on an IOS−Based Switch To view the UplinkFast configuration on an IOS command−based switch, enter the following Privileged mode command: show uplink−fast Vie.
Chapter 11: Multilayer Switching In Depth Earlier in this book, I told you that switches were Layer 2 devices and routers were Layer 3 devices, which fit nicely into those well−known seven layers. You know the seven—the Open System Interconnection (OSI) Reference Model layers.
manner. This method is similar to sending a piece of mail: You put it in the mailbox, but you have no guarantee that it will arrive—just the likelihood it will reach its destination. Using other protocols, including those at Layer 2 and Layer 4, the network traffic is made up of a series of end−to−end conversations also known as flows .
Figure 11.1 shows the three MLS components contained in a single switch chassis, such as that of a Cisco Catalyst 5000 or 6000 family switch. Figure 11.
MLS Flows When a flow process begins, the MLS−RP starts sending out multicast hello messages every 15 seconds to all switches in the network that accept MLS−RP messages.
go through the router. The MLS−SE rewrites the packets to look as if they had been forwarded by a router. Note The MLS cache size can grow to a maximum of 128K. When the cache on the MLS−SE grows larger than 32K, it is likely that flows in the network will not be switched by the MLS−SE and forwarded to a router.
Figure 11.5: An MLS switch and two MLS routers. IP Access Lists and MLS Interaction When any interface has an inbound access list applied, the interface where the access list is applied cannot be used for MLS. However, you can apply an output access list on an interface, and it will not affect MLS.
You may become confused when trying to troubleshoot MLS because the commands you need to watch out for are not directly related to MLS. Remember this basic rule: Any command that involves the router examining each packet to perform an action will disable MLS on an interface.
VTP domains • Management interfaces • Tip On the Catalyst 2926G−L3, 4908G−L3, or 2948G−L3 switch, at least one MLS−RP must be configured. Multiple MLS−RPs can be configured in a single line; up to 16 MLS−RPs can participate in MLS. MLS Cache The MLS cache is used to maintain the flow information for all active flows.
MLS Cache Fast Aging Time The processing of the MLS cache entries can cause performance problems on your switch. To keep this situation under control, it’s good practice to monitor the IP cache and make sure it remains well under the maximum size of 128K.
Let’s examine each of these tasks, as well as how to disable each of these features in case they are no longer needed on an interface. Related Solutions: Found on page: Configuring a Hostname on an .
Router(config) interface fastethernet 1/1 To assign a VTP domain of coriolis to the interface, use the following command: 2. Router(config) mls rp vtp−domain coriolis Warning This step must be performed prior to using any of the other MLS interface commands on the MLS interface.
Re−enabling MLS on a Catalyst 5000 To re−enable MLS on a Catalyst 5000, use the following command: CAT5000(enable) set mls enable Disabling MLS on a Catalyst 6000 To disable MLS on a Catalyst 6000.
Configuring Long Aging on the Catalyst 6000 To configure the long aging time on the Catalyst 6000, use the following command: mls aging long < seconds> An example of using the mls aging long com.
Monitoring and Viewing the MLS Configuration Commands on each MLS−SE and MLS−RP to monitor and view the configurations of each device are different.
MLS−RP IP MLS−RP ID Xtag MLS−RP MAC−Vlans —————————— ———————————— ———— —————————————————————— 38.
38.187.128.254 0000808dade0 2 00−00−80−8c−dc−a2 1 38.187.127.254 0000808a22b2 3 00−00−80−8c−dc−a6 2 Viewing MLS Statistics on the Catalyst 6000 On the Catalyst 6000, you can get in.
Chapter 12: Hot Standby Routing Protocol In Depth Dynamic environments are constantly growing. I happen to work in one and I see the demand for 99.99 percent reliability increasing every day. However, even in a worldwide Enterprise network, high availability solutions are not prepared for various network failures.
The next sections look at some ways that administrators and engineers have devised to overcome problems related to assigning default gateways, along with the benefits and difficulties in using each technique.
The Solution HSRP is a Cisco proprietary protocol developed for redundancy. It defines a group of routers working as one virtual router. It enables host interfaces to continue communicating outside the local segment even if a host interface’s default route fails or the link is down.
Active route processor • Standby route processor • Virtual route processor • All other route processors fall into the “other route processor” category. Warning By increasing the number of standby groups on a route processor, you decrease the route processor’s performance and increase latency.
Each standby group contains an IP address and a well−known MAC address assigned to the group. The IP address for the standby group is within the range of IP addresses belonging to the subnet or VLAN to which the route processor is providing services.
to the route processor. Learn state —The route processor transitions to this state and remains in this state until it receives a hello message from the current active router. The hello message allows the route processor to learn the virtual IP address of the current virtual router.
standby group. If a route processor fails, it automatically decrements its priority on that interface and stops transmitting hello messages out the interface. The standby route processor assumes the active router role when no hello messages are detected for the specified holdtime period.
Assigning an HSRP Interface Priority You should increase the priority of the interface in the HSRP group that you would like to be active by default. Always remember that the interface with the highest priority becomes the active route processor for the HSRP group.
Removing the HSRP Hello and Hold Timers To remove the manual timer settings and return the settings to the default values for HSRP group 3, use the following command: no standby 3 timers Configuring a Clear−Text Password for HSRP Authentication You can specify a clear−text password for the HSRP authentication string for the interface.
You selected and entered the VLAN interface you want to have configured (vlan200). 1. You configured the HSRP group and entered the virtual default gateway IP address on that interface. 2. You set the priority accordingly, allowing one route processor to be active and the other to be standby.
Tip To get a brief output of all the configured interfaces, you can use the show standby brief command. Using the debug Command By enabling the debug command, it will list the changes in real−time for the HSRP group you specified. This includes the sending and receiving packets through the HSRP.
Chapter 13: Policy Networking In Depth Behind all switching implementations and configurations lies an area that, if left unattended, can render you and your network defenseless: access security policies. In this chapter, we will discuss the need for and creation of access security policies; we will also focus on how to implement these policies.
Figure 13.1: A short list of various switches overlapping into different areas of the policy layers. Core Layer Policies By implementing security policies at the Core layer, also known as the backbone.
Managing Hypertext Transfer Protocol (HTTP) access • Access Lists An access list is a list of conditions that control access to the switch, router, or route processor. IP, AppleTalk, and Internetwork Packet Exchange (IPX) access lists are like gatekeepers that control access from or to different segments of the network.
access list string as an example: access−list 2 permit 193.5.5.10 0.0.0.255 log Tip An octet is the 8−bit value between each dotted decimal in an IP address. For the IP address of 193.5.5.10 the first octet is 193 and the fourth octet is 10. It is always important to remember which octet you want to mask.
Item Network 1 Network 2 Network 3 Network 16 32 48 First Host 17 33 49 Last Host 30 46 62 Broadcast Address 31 47 63 Subnetting using variable length subnet masks (VLSM) seems pretty easy, doesn’t it? The type of access list defined is identified by the number you assign to the access list.
operator —This syntax element compares source or destination ports. Possible syntaxes include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). • log —This syntax enables logging of information about packets that match access list entries.
access−class —Applies the access list to an interface for security purposes. This command identifies users of specified VTY lines. By default, five VTY lines come in to your Cisco Internetwork Operating System (IOS) or router.
Next, you must specify a routing protocol: in this case, Enhanced Interior Gateway Routing Protocol (EIGRP). To do so, use the following command: router eigrp 2 The last step is to apply the configured access list. Use the distribute−list command to interface g0/0 to filter outbound traffic from network 192.
Privilege level 0 is a special level that allows the user to use a more specific defined set of commands. As an example, you could allow a certain user to use only the show arp command. This command is useful when a third party is using a sniffer on your network and needs to match a MAC address to an IP address and vice versa.
After you enable port security on any switch port, any static or dynamic CAM entries associated with the port are cleared, and any currently configured permanent CAM entries are treated as secure MAC addresses. • Not all Cisco switches support port security.
HSNRSM(config)# access−list 100 deny tcp any any eq 20 HSNRSM(config)# access−list 100 deny tcp any any eq 21 Because the access list has an implied “deny all” at the end, you need to apply a rule that any other traffic can pass through. The ip indicates that all IP protocols are being identified: 3.
host A single destination host lt Match only packets with a lower port number neq Match only packets not on a given port number range Match only packets in the range of port numbers Now do the same for the destination address identifying the destination of 172.
CoriolisRSM1(config)#access−list 199 permit ip any ? A.B.C.D Destination address any Any destination host host A single destination host Just as in Step 7, we need to identify the destination addresses to permit: 8. CoriolisRSM1(config)#access−list 199 permit ip any any CoriolisRSM1(config)# You’re not quite done yet.
Configuring a Telnet Session Time−Out Value To lower the chances for vulnerability when an administrator walks away from a logged−in Telnet session, you can configure and apply a time−out condition to unused VTY sessions.
To configure the time−out value to five minutes on the console port of an IOS−based route processor or router, use the following command: HSNRSM (config)# line console 0 HSNRSM (config−line)# ex.
Syntax Description aaa Allows authentication, authorization, and accounting (AAA) to be used for authentication enable Allows the enable password method; the default method of HTTP server user authent.
———— —————————— —————————— —————————— —————————— ———————— 3/3 0 0 0 0 0 Port Single−Col Multi.
Dynamic Addresses Count: 5 Secure Addresses (User−defined) Count: 0 Static Addresses (User−defined) Count: 0 System Self Addresses Count: 12 Total MAC addresses: 8 Non−static Address Table: Dest.
Chapter 14: Web Management In Depth Imagine having to manage all the com closets throughout your enterprise without the use of a remote management tool.
IE is not supported on Solaris, and Netscape 4.6 is not supported at all. However, you can try to access the switch through your browser to determine whether your browser version is supported. If your browser is not supported, the switch will display an error message, and the session will not complete.
and want to retype an entry, click on Cancel to undo your first entry. Note Again, keep in mind that if you are using IE5, you must use the Refresh button in your browser after each configuration change to see the updates. Otherwise, you risk making a mistake down the line.
Chapter 2, which explains how to configure the CLI for an IP address and a Level 15 password in order to use the CVSM. The last section of the Immediate Solutions section will walk you through the CVS.
New setting ===> 1024 We have now changed the HTTP port to 1024. You should use a numbering scheme that your department or organization believes to be the best.
Figure 14.2: This page allows you the ability to configure port speeds, view statistics, name the ports, and manage various switch modules if they have been inserted into the switch.
Figure 14.4: This page allows you to configure the SNMP properties, such as the community settings, and identify the IP address for the trap messages to be sent to.
Figure 14.6: The CDP Management page allows you to choose which ports you want defined for CDP. SPAN —The SPAN Configuration and Port Monitoring page. Here you have the option of selecting the port to which you want to send the captured frames and the ports to be monitored.
Figure 14.8: This page allows you to manage the console and firmware upgrades. Note Prior to a TFTP upgrade a dialog box will appear and say something like, “When you use this page to upgrade the switch, it may not respond for up to one minute. During this time do not unplug the switch.
Figure 14.10: On this page you can control and manage broadcast storms and overall IP configuration of the switch. CGMP —The CGMP Management page. By default, CGMP is enabled. This page allows you to configure the use of CGMP to dynamically discover end−user stations participating in multicast applications.
Click on the ports you want to monitor in the Ports Not Monitored window. Click on the Add button to move them to the Ports Monitored Window. 2. Select the port you wish to monitor from by choosing from the pull−down menu next to Select Monitoring Port.
Chapter 15: The Standard Edition IOS In Depth The Cisco 1900 and 2820 switches come with two unique IOSs: Standard Edition and Enterprise Edition. The Standard Edition is a character−based IOS, and the Enterprise Edition is similar to the IOS on higher−end routers.
[P] Port Configuration [A] Port Addressing [D] Port Statistics Detail [M] Monitor [V] Virtual LAN [R] Multicast Registration [F] Firmware [I] RS−232 Interface [U] Usage Summaries [H] Help [K] Command Line [X] Exit Management Console Enter Selection: The following sections describe the Main Menu options.
The password is case−insensitive and can contain any character with a legal keyboard representation. [E] Modify secret password —The Management Console secret password can help prevent unauthorized access. This password is stored in encrypted form and thus provides enhanced security.
[R] Reset system —This option recycles the power on the switch. • [F] Reset to factory defaults —This option clears all configuration settings back to the factory defaults. • Warning If you apply the [F] option, all manual configuration settings will be lost.
[V] Management VLAN —Allows you to set the VLAN in which you will configure your switch. Cisco recommends that you choose a VLAN other than 1 because all ports are in VLAN1 by default. On the Standard Edition of the IOS software, the available VLANs are 1 through 4.
SNMP Default Trap Messages By default, the Cisco Catalyst 1900 and Catalyst 2820 series switches send certain trap messages. Trap messages are sent by default in response to the following events: Port.
Enter Selection: The following list shows the commands from the CDP Configuration/Status menu: [H] Hold Time (secs) —Indicates how long a CDP multicast will remain in the CDP table. The valid entries are from 5 to 255 seconds, and the default is 180 seconds.
Syntax Port A1 Port 25 B1 Port 26 AUI The AUI port 1 through 24 An individual port on the switch The Port Configuration menu is as follows: Catalyst 2820 − Port 24 Configuration ——————.
[N] Next port —This option is used to forward to the next configurable port. • [G] Goto port —This option is used to configure any identified port. • [P] Previous port —This option is used to configure the previous configurable port. • [X] Exit to Main Menu —This option returns you to the Main Menu.
[A] Port Addressing The Port Addressing menu allows you to set up security and to add static MAC addresses to a port. When entering this option, you must first identify a port to configure, as listed in Table 15.2. Table 15.2: The available configurable ports on a Catalyst 2820 from the Port Addressing menu.
[C] Configure port —Provides a shortcut to the Port Configuration menu. • [V] View port statistics —Displays individual port statistics. • [N] Next port —Forwards to the next configurable port. • [G] Goto port —Configures any identified port.
Catalyst 2820 − Virtual LAN Configuration VLAN Name Member Ports ——−− ———————————— ———————————— 1 VLAN 1 1−24, AUI, A, B ——————.
Catalyst 1900 − Firmware Configuration ——————————————————System Information—————————————————— FLASH: 1024K bytes V9.00.00 Standard Edition Upgrade status: No upgrade currently in progress.
The following list explains the options available from the RS−232 Interface Configuration menu: [B] Baud rate —Lets you enter the baud rate. The possible settings are 2400, 9600, 19200, 38400, or 57600 for the console port. The default baud rate is 9600.
Errors: Errors: FCS errors 0 Late collisions 0 Alignment errors 0 Excessive deferrals 0 Giant frames 0 Jabber errors 0 Address violations 0 Other transmit errors 0 Select [A] Port addressing, [C] Conf.
Receive Forward Transmit —————————————————————————————— 1 : 0 0 0 2 : 0 0 0 3 : 9352 9352 90514 4 : 0 0 0 5 : 0 0 0 6 : 3678 3677 81423 7 : .
The following list describes the three menu options: [M] Menus —Displays the switch’s Main Menu. ♦ [I] IP Address —Available at log−on if the switch does not have a password configured. ♦ [P] Console Password —Allows you to enter an unencrypted privileged−level password to the switch management interface.
[X] Exit to previous menu Enter Selection: This menu allows you to control the propagation of broadcasts to each port. The following list gives a brief description of each setting: [A] Action upon exceeding broadcast threshold —Indicates what action will be taken in the event that the broadcast number threshold is exceeded.
Catalyst 1900 − Network Management (SNMP) READ Configuration ——————————————————————— Settings ————————————————— [1] Fi.
[D] Fourth WRITE manager name or IP address [X] Exit to previous menu At this point you can select option [1] and configure the WRITE community string and change the default community string from “p.
We now want to bind the IP address of our SNMP management station to the trap community string. To do this, enter the new community string, and select [1].
——————————— Actions ——————————————————————————————————— [A] Add ports to capture list [D] Delete ports from capture list [X] Exit to Main Menu Enter Selection: A This command adds ports to the capture list.
[P] VTP Statistics [X] Exit to Main Menu Select [V], and accept the default setting of Server. Because the change we want to make is to add a server, we will take the defaults: VTP mode may be set to [C]lient, [S]erver or [T]ransparent: Current setting ===> Server New setting ===> Server 2.
You should now see the Trunk A Configuration menu The next step is to enable trunking. To do so, select [T] from the menu, as shown here: Catalyst 1900 − Trunk A Configuration Menu Trunking status: .
Assigning a Static VLAN to an Interface on a 1900EN Series 156 Configuring Spanning Tree Protocol To configure Spanning Tree Protocol, start from the Main Menu and do the following: Select option [N], Network Management.
This command disables the Spanning Tree Protocol for a list of VLANs. You may disable the Spanning Tree Protocol for a list of VLAN numbers. VLAN numbers range from 1 to 1005. VLAN numbers should be separated by commas or spaces. A VLAN number range may also be specified.
Chapter 16: Switch Troubleshooting In Depth Switch troubleshooting includes both hardware and software. The switch hardware can be anything from a Supervisor Engine to a module, card, chassis, or even a power supply. The software can be the individual module software or the IOS.
Port Number LED Test 1 Ports (loopback) 2 Ethernet address PROM 3 CAM (MAC address) table 4 RS−232 console port 5 Realtime clock 6 CAM memory (SRAM) 7 Timer interrupt 8 Port control status 9 Flag me.
The active LED indicates the following: Orange —The Supervisor Engine is in standby. • Green —The Supervisor Engine is operating correctly. • Other LEDs are on the individual line modules, as shown in Figure 16.2. These LEDs indicate the status of each module.
This problem is addressed by Cisco with the use of Switched Port Analyzer (SPAN). SPAN allows the switch to copy all the packets that are sent to nodes connected to the switch ports and direct them to another port. In essence, the designated switch port becomes a mirror of the monitored port or ports.
Figure 16.3: A screen capture from CiscoView. User Tracking —Used in the creation and management of dynamic VLANs. Cisco switches permit VLAN assignments based on dynamic VLAN assignments. This means the Media Access Control (MAC) address is used to assign the port to a specific VLAN.
show cam • show cdp neighbors • show config • show flash • show interface • show log • show mac • show port • show spantree • show system • show test • show version • show vtp .
show flash Cisco switches operate with software that is very similar to the Cisco IOS on routers. This software is stored and may be upgraded in flash stored on the Supervisor module.
show system Using the show system command, you can obtain a component status summary regarding the switch components. This information includes the system status, current traffic percentage, peak percentage, status of the fans, power supplies, and modem; uptime, and system identification configuration.
set system contact Sean Odom/Gina Galbraith ! #snmp set snmp community read−only public set snmp community read−write private set snmp community read−write−all all set snmp rmon disable set sn.
set vlan 1003 name Token−Ring−default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7 ! #spantree ! #uplinkfast groups set spantree uplinkfast disab.
set logging level snmp 2 default set logging level spantree 2 default set logging level sys 5 default set logging level tac 2 default set logging level tcp 2 default set logging level telnet 2 default.
set port membership 2/1−24 static set cdp enable 2/1−24 set cdp interval 2/1−24 60 set spantree portfast 2/1−24 disable set spantree portcost 2/11 10 set spantree portcost 2/12 10 set spantree.
1912EN# Viewing the Software Version on a Set/Clear Command−Based IOS Module To view the software version of a module on a Set/Clear command−based IOS, use the show version command. This command will not work on internal route processor modules, however.
epld 3.1 30 72920 06/14/99 19:33:06 lcp atm 3.1 12−15 23747 06/14/99 11:16:06 lcp tr 3.1 12−15 28737 06/14/99 11:17:19 lcp c5ip 3.1 12−15 23723 06/14/99 11:26:40 lcp 64k 3.1 12−15 57100 06/14/99 11:28:15 atm/fddi 3.1 12−15 24502 06/14/99 11:47:07 lcp 360 3.
—————————————— . . . Channel Status : Ports 1 2 —————————————— . . Note There is no comparable command on the 1900EN series switches. Testing External Module Hardware on a Set/Clear Command−Based Switch The Catalyst 5002 I am using has a Supervisor Engine in Slot 1.
Viewing the VTP Domain Configuration on a Set/Clear IOS The show vtp domain command can be used to obtain the VTP domain configuration on a Set/Clear command−based IOS switch.
Protocols Configured: Address: Received: Transmitted: IP 68.127.187.10 95563219847 81294682 Virtual LAN ID: 2 (Inter Switch Link Encapsulation) vLAN Trunk Interface: FastEthernet1/0.2 Protocols Configured: Address: Received: Transmitted: IP 68.127.186.
Catalyst5002> (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type ieee Designated Root 00−00−80−0c−a1−b3 Designated Root Priority 32768 Designated Root Cost 0 Designate.
Port Ethernet 0/1 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0000.
Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.
1912EN#show mac Number of permanent addresses : 5 Number of restricted static addresses : 0 Number of dynamic addresses : 1 Address Dest Interface Type Source Interface List ————————.
1912EN#show cdp neighbors Capability Codes: R − Router, T − Trans Bridge, B − Source Route Bridge S − Switch, P − Repeater, H − Host, I − IGMP DeviceID IP Addr Local Port Capability Platform Remote Port 1005 68.
MAC Dely−Exced MTU−Exced In−Dcrd Lrn−Dcrd In−Lost Out−Lost 1/1 0 0 0 0 0 0 1/2 0 0 0 0 0 0 2/1 0 0 0 0 0 0 2/2 0 0 0 0 0 0 2/3 0 0 0 0 0 0 2/4 0 0 0 0 0 0 2/5 0 0 0 0 0 0 2/6 0 0 0 0 0 0 2.
Last−Time−Cleared —————————————————————————— Sat Sep 23 2000, 11:29:11 Viewing Port Statistics on a CLI−Based IOS To view the port statistics on a CLI−based IOS, use the show usage command.
Using the Port Configuration on a Set/Clear Command−Based IOS The show port command can be used on a Set/Clear command−based IOS switch to view the port configuration.
Ethernet 0/9, Ethernet 0/10, Ethernet 0/11, Ethernet 0/12 Ethernet 0/25, FastEthernet 0/26, FastEthernet 0/27 1912EN#show port monitor Port monitoring state: Enabled Monitor port: None Ports being mon.
1 default Enabled 5−12, AUI, A, B 2 Engineering Enabled 1−2 3 Admins Enabled 3−4 1002 fddi−default Suspended 1003 token−ring−defau Suspended 1004 fddinet−default Suspended 1005 trnet−d.
Receive Statistics Transmit Statistics —————————————————————————————————— ———————————————————.
sp+B0: 10001030 10001030 10000BD0 10000AD0 sp+C0: 10000B28 10001030 10001030 10001030 sp+D0: 10001030 10001030 10001030 10001030 sp+E0: 10001030 10001030 10001030 10001030 sp+F0: 10001030 10001030 100.
Press and hold down the Mode button, as shown in Figure 16.5, while cycling the power on the switch. Figure 16.5: The Mode button on a 1900 Series switch.
[C] Continue with standard system start up [U] Upgrade operation firmware (XMODEM) [S] System debug interface Enter Selection: Use the [U] Upgrade Operation Firmware (XMODEM) option to upgrade the fir.
[T] Toggle byte/word display Word [V] Value for output 0000H (0) ————————————————Actions———————————————— [I] Input [O] Output [X] Exit t.
Appendix A: Study Resources Glossary Books McDysan, David E. and Darren L. Spohn, ATM Theory and Application , McGraw−Hill: New York, 1998. ISBN: 0−07045−346−2. This book is a great resource on Asynchronous Transfer Mode (ATM) and LAN Emulation (LANE).
Online Resources Multiple documents are available on the Web, but the best place for information is the Cisco Web site. Cisco is one of the best companies at providing documentation on its products. You can find the Cisco Web site at http://www.cisco.
Quality of Service Quality of Service Overview — www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcdintro.htm • Configuring Quality of Service on a Cisco Catalyst 6000 — www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_5_4/config/qos.
Internet Engineering Task Force (IETF) —This organization is responsible for the TCP/IP, Simple Network Management Protocol (SNMP), and Internet standards. A lot of its work relates to upgrading and enlarging the TCP/IP protocol suite and networks utilizing that protocol.
Appendix B: Basic IOS CLI−to−Set/Clear Commands Overview Many features are supported by the Set/Clear−based switches, which include the Catalyst 5000 and 6000 families of switches. Most basic commands on a Command Line Interface (CLI)−based IOS can be mapped to commands that provide similar functionality on the Set/Clear−based CLI.
configuration show vlan Shows the VLAN configuration show vlan show vtp Shows the VLAN Trunking Protocol (VTP) configuration show vtp domain spantree <vlan−list> Configures STP set spantree en.
Appendix C: The Cisco Consultant Overview On the side, I run a small consulting company. When I tell people that I am a Cisco consultant, they usually reply, “Oh”; or, they ask how well Cisco’s stock is currently doing. Consulting means that you work from one project to another on a freelance basis.
Make sure you are on time for your first appointment with the customer. Turn off your cellular phone (let voice mail be useful for once) and put your pager on vibrate. You want to project to the customer that he or she is the most important person in the world at that moment.
(briefly, this term refers to the fact that buying equipment correctly up front will be significantly cheaper than upgrading individual components later when it becomes necessary). Customers may not want to invest more money than they have to in the short term, but sometimes they will—and you wind up making a much bigger sale.
Contracting When you first go into business as a consultant, you should have a contract that is created by an attorney and authorized by your insurance carrier. Once you have the contract in a word−processing document form that outlines your liabilities and those of the customer, you can modify the contract to suit each individual customer.
would only be there a week or so. The first day the contractor showed up, we gave him the initial payment for his work. He did a great day of work, removing the old flooring, vents, cabinets, toilet, and other fixtures. He said he would be back the next day to work some more—but the next day came and went, and he failed to show up.
Failing to Take Responsibility If you realize that you failed to contract an item, you should absorb the cost if it is small. No one feels more nickeled and dimed than a person who has hired a consultant, when the consultant says he forgot to add a cable and will be charging another $10 five times.
Appendix D: Cisco 1912EN and Catalyst 5000 Configuration Practice Lab Today Joe Snow, our imaginary consultant, has received a Catalyst 1912EN switch, a Catalyst 5000 with a Supervisor Engine III, and a 24−port 10/100 Ethernet module. Joe has taken both the switches out of the box and has assembled all the devices into a rack.
Mod MAC−Address(es) Hw Fw Sw —— ————————————————————————————————————— ———— ——————— —————————————————— 1 00−50−bd−a0−b0−00 to 00−50−bd−a0−b3−ff 2.
Figure D.1: The sample configuration. Possible Solution More than one solution exists to any problem; however, here is the suggested solution to configuring the Cisco Catalyst 1912EN, the Cisco Catalyst 5000, and the Cisco 2620 trunked interface.
1912EN(config)# enable password level ? <1−15> Level number 1912EN(config)# enable password level 1 coriolis1 1912EN(config)# enable password level 15 coriolis2 1912EN (config)# enable secret coriolispass Enter Interface Configuration mode to configure the Fast Ethernet 0/27 port on the 1912EN.
1912EN(config)#vtp domain Coriolis 1912EN(config)#vtp domain server 1912EN(config)# exit Note The configuration on the 1912EN is saved automatically, so you do not need to save the configuration.
Port(s) 2/24 trunk mode set to on. Port(s) 2/24 trunk type set to isl. 2000 Oct 19 12:32:46 %DTP−5−TRUNKPORTON:Port 2/24 Enable this switch to be a VTP client for the Coriolis VTP domain.
Appendix E: Switch Features This appendix is dedicated to helping you determine which switch needs to be placed in your network. If the wrong switch is placed in each point in your network the load can cause severe problems, including bottlenecks or load failures.
Cisco Catalyst 2820 For an environment that needs high−speed links to the wiring closet for 20 or so users, the Catalyst 2820 is an ideal solution. This switch is perfect for smaller wiring closets where it is not economical to purchase a high−end solution such as a Cisco Catalyst 5000 series switch.
Table E.3: The models and features available for the standard version of each Cisco Catalyst 2900 XL series switch. Feature 2908 XL 2912 MFXL 2916 XL 2924 MXL 2924 CXL 10/100 ports 8 0 16 24 22 100BaseFX ports 0 12 0 0 2 Expansion slots 0 2 0 2 0 Enterprise Edition Yes Yes Yes Yes Yes Standard Edition Yes No Yes Yes Yes Backplane 3.
Expansion slots 0 0 2 0 Enterprise Edition Yes Yes Yes Yes Standard Edition No No No No Backplane 1.2Gbps 1.2Gbps 1.2Gbps 24Gbps Flash 4MB 8MB 12MB 0 RAM 20MB 32MB 64MB NA Modularity No No Yes NA Forw.
Gigabit Ethernet ports for GBIC Ethernet aggregation. It also has built−in support for Voice Over IP telephony, in addition to built−in support for up to 250 port−based VLANs and ISL VTP. In addition, the 3500 series supports many of the features of the 1900 and 2900 series, such as DNS and DHCP.
Key Features and Benefits The Catalyst 3900 has the following features: Twenty shielded Token Ring ports for 150−ohm shielded twisted pair (STP) or 100−ohm unshielded twisted pair (UTP) connectivi.
Catalyst 4000 series • Catalyst 5000 series • Catalyst 6000 series • Cisco Catalyst 4000 Series The Catalyst 4000 series provides very fast and intelligent Layer 2 switching services using a 24Gbps switching fabric. It is used in Ethernet networks utilizing 10−, 100−, and 100Mbps switching.
configuration across all switches Support for all advanced switching features of the Cisco IOS software • Support for advanced multicasting with CGMP • The Catalyst 5000 series of switches uses an architecture based on Supervisor Engines I, II, and III.
switching in distribution and server−aggregation environments. The Catalyst 6000 family complements the Catalyst 5000 series and 8500 series switches. The Catalyst 6000 family is capable of scaling bandwidth from T1 to OC−192 in the WAN/MAN, and from Ethernet to 10 Gigabit Ethernet in the LAN.
Catalyst 8400 series • Catalyst 8500 series • BPX 8600 series • MGX 8800 series • Catalyst 12000 series • Note Cisco considers the Catalyst 5500 and the Catalyst 6500 series switches as versatile Distribution and Core layer switches.
Low−Delay, Code−Excited Linear Prediction (LD−CELP) at 16Kbps • Conjugate−Structured, Algebraic Code−Excited Linear Prediction (CS−ACELP) at 8Kbps • The IGX voice interfaces also support the VAD silence suppression technique, which sends cells on the trunk only when there is something to send.
Table E.12: The key features of the Cisco Catalyst 8510 and 8540. Feature 8510 8540 Modular slots 5 13 Forwarding rate 6 million pps 24 million pps Backplane 10Gbps 40Gbps BPX 8600 Series The BPX 8600.
MGX 8800 Series The Cisco MGX 8800 series wide−area edge switches integrate Cisco IOS software IP capabilities and carrier−class ATM in a single platform. The MGX 8850 switch enables delivery of differentiated services while scaling from DS0 to OC−48c/STM−16 speeds.
The MGX 8800 RPM also supports MPLS. It can act as a label edge router or label switch router. It also supports MPLS−VPNs via mulitprotocol BGP extentions, VPN route−target extended BGP community attributes, MPLS forwarding across backbone, and multiple routing/forwarding instances on the provider edge router.
512K configuration nonvolitile RAM (NVRAM) • 8MB boot flash • Two PC Card Type II software upgrades • Ethernet (RJ−45 and MII connectors) for network management access • Local console and mo.
then forwards the frame out all the ports. American National Standards Institute (ANSI) The organization that publishes standards for communications, programming languages, and networking. ANDing The process of comparing the bits of an IP address with the bits in a subnet mask to determine how a packet will be handled.
B backbone A high−capacity infrastructure system that provides optimal transport on a LAN. Typically in a LAN, the data running from router to router, switch to switch, or switch to router is transported through a faster physical topology than the rest of the local area or virtual LAN devices.
device or Layer 2 device that can filter broadcasts. On a switched network using VLANs, the broadcast domain is all the ports or collision domains that belong to the same VLAN. broadcast storm Occurs when broadcasts throughout the LAN become so numerous that they use up all the available bandwidth, thus grinding the network to a halt.
support CDP. Cisco Express Forwarding (CEF) Used in the CEF ASIC (CEFA) and Distributed Cisco Express Forwarding (dCEF) ASIC, Cisco’s newest ASICs. These ASICs, which are used in Cisco’s high−end devices, are the most functional and efficient ASICs in the Cisco product line.
A feature of the SAMBA ASIC used to cause the EARL to make forwarding decisions. It also ensures that a tagged frame that comes from a particular VLAN does not exit through a port belonging to another VLAN. CBL also assists in placing ports in one of four different modes for Spanning−Tree Protocol: blocking, learning, listening, or forwarding.
Data Service Unit (DSU) A component that formats and controls data for transmission over digital lines. It is used in conjunction with a Channel Service Unit (CSU). Data Terminal Equipment (DTE) A device at the user end of a user−network interface that serves as a data source, a destination, or both.
dumb terminal An end−user station that can access another computer or switch but cannot provide any processing at the local level. Dynamic Host Configuration Protocol (DHCP) A protocol that provides an IP address to requesting nodes on the network. Dynamic ISL A protocol that performs trunking negotiation.
A connection used on the Catalyst 5000 family of switches. It allows as many as seven Ethernet links to be bundled and load−balanced frame by frame to provide up to 800Mbps of bandwidth. It can utilize half−duplex or full−duplex links. Fast Ethernet IEEE 802.
A Data Link layer switching protocol used across multiple virtual circuits of a common carrier, giving the end user the appearance of a dedicated line. frame tagging A VLAN implementation method used to add VLAN information to data frames. As a frame enters the switch, it is tagged with VLAN information.
hub A hardware device that connects multiple independent nodes. Also known as a concentrator or multiport repeater . Hypertext Transfer Protocol (HTTP) A protocol used by Web browsers to transfer pages and files from a remote node to your computer. IEEE See Institute of Electrical and Electronics Engineers .
Standard for inserting a frame tag VLAN identifier in the frame header. As a frame enters the switching fabric, it is tagged with additional information regarding the VLAN properties. The tag remains in the frame as it is forwarded between switches and is removed prior to exiting the access link to the destination interface.
internetwork A group of networks that are connected by routers or other connectivity devices so that the networks function as one network. Internetwork Operating System (IOS) Cisco’s proprietary operating system, used in its routers and switches.
A broadcast on the local network, looking for the IP address of the destination host. local service Service where the device supplying the service resides on the same subnet as the device requesting the service. Local Target Logic (LTL) A feature of some line modules that assists the EARL in making forwarding decisions.
microwaves Very short radio waves used to transmit data over 890MHz. modem A device used to modulate and demodulate the signals that pass through it. It converts the direct current pulses of the serial digital code from the controller into the analog signal that is compatible with the telephone network.
A protocol that allows all network equipment to synchronize the date and time on the private or internetwork environment. network−to−network interface (NNI) An interface that provides connectivity between two ATM switches.
is the common modem connection used for Internet dial−up. Point−To−Point Tunneling Protocol (PPTP) A protocol that encapsulates private network data in IP packets.
customers, which remains analog. Q−R Quality of Service (QoS) A guarantee of a particular level of service for a connection. QoS uses queuing and other methods to guarantee that bandwidth is available for a certain protocol, application, or address.
Route Switch Module (RSM) Cisco’s first multiprotocol multilayer switch module, which utilizes the full support of the Cisco IOS for performing Layer 3 routing from a slot internally on a Layer 2 switch. This module provides for interVLAN connectivity.
the same community. Simple Network Management Protocol (SNMP) trap An SNMP protocol utility that sends out an alarm in an identified community notifying members of the community that some network activity differs from the established threshold, as defined by the administrator.
A 12−digit number that is used to uniquely identify each device on an IPX network. storage area network A subnetwork of storage devices, usually found on high−speed networks and shared by all servers on the network. store−and−forward A fast packet−switching method that produces a higher latency than other switching methods.
An organization that develops standards with the EIA (Electronics Industries Association) for telecommunications technologies. Telnet Standard terminal−emulation protocol in the TCP/IP protocol stack.
U−X unicast A frame in which the destination MAC address specifies the single destination computer. Unicast can be summarized as direct network traffic between two individual nodes. unshielded twisted−pair (UTP) A type of cable that uses multiple twisted pairs of copper wire in a casing that does not provide much protection from EMI.
An important point after buying a device Cisco RJ-45-to-AUX (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Cisco RJ-45-to-AUX yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Cisco RJ-45-to-AUX - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Cisco RJ-45-to-AUX you will learn all the available features of the product, as well as information on its operation. The information that you get Cisco RJ-45-to-AUX will certainly help you make a decision on the purchase.
If you already are a holder of Cisco RJ-45-to-AUX, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Cisco RJ-45-to-AUX.
However, one of the most important roles played by the user manual is to help in solving problems with Cisco RJ-45-to-AUX. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Cisco RJ-45-to-AUX along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center